Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Security | 5 |
| Decision Making | 5 |
| Risk Management | 5 |
| Risk | 3 |
| Information Technology | 2 |
| Standards | 2 |
| Business | 1 |
| Case Studies | 1 |
| Certification | 1 |
| Check Lists | 1 |
| Cognitive Structures | 1 |
| More ▼ | |
Author
| Alper Yayla | 1 |
| Dark, Melissa | 1 |
| Mohammed Salem Al-Atoum | 1 |
| Muhammad Al-Abdullah | 1 |
| Poftak, Amy | 1 |
| R. Ikuenobe Osolease | 1 |
| Shim, Woohyun | 1 |
| Singh, Anand | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
Audience
Location
| South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
R. Ikuenobe Osolease – ProQuest LLC, 2021
The purpose of this study is to identify the best model that explains the relationship between conflicting risk structures and decision quality. Using confirmatory factor analysis and hierarchical regression techniques as statistical methods, the author confirmed that changes in the conflicting risk structures correlated with changes in decision…
Descriptors: Computer Security, Information Security, Risk Management, Risk
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Singh, Anand – ProQuest LLC, 2009
manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…
Descriptors: Risk Management, Risk, Engineering, Vendors
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks

Peer reviewed
Direct link
